{"id":"CVE-2023-53515","summary":"virtio-mmio: don't break lifecycle of vm_dev","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-mmio: don't break lifecycle of vm_dev\n\nvm_dev has a separate lifecycle because it has a 'struct device'\nembedded. Thus, having a release callback for it is correct.\n\nAllocating the vm_dev struct with devres totally breaks this protection,\nthough. Instead of waiting for the vm_dev release callback, the memory\nis freed when the platform_device is removed. Resulting in a\nuse-after-free when finally the callback is to be called.\n\nTo easily see the problem, compile the kernel with\nCONFIG_DEBUG_KOBJECT_RELEASE and unbind with sysfs.\n\nThe fix is easy, don't use devres in this case.\n\nFound during my research about object lifetime problems.","modified":"2026-04-02T09:44:22.032877Z","published":"2025-10-01T11:46:03.192Z","related":["SUSE-SU-2025:03600-1","SUSE-SU-2025:03615-1","SUSE-SU-2025:03628-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:3716-1","SUSE-SU-2025:3751-1","SUSE-SU-2025:3761-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4141-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53515.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2dcb368fe5a8eee498ca75c93a18ce2f3b0d6a8e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3ff54d904fafabd0912796785e53cce4e69ca123"},{"type":"WEB","url":"https://git.kernel.org/stable/c/55c91fedd03d7b9cf0c5199b2eb12b9b8e95281a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5b7d5c2dd664eb8b9a06ecbc06e28d39359c422e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/97a2d55ead76358245b446efd87818e919196d7a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/af5818c35173e096085c6ae2e3aac605d3d15e41"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b788ad3b2468512339c05f23692e36860264e674"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53515.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53515"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"7eb781b1bbb7136fe78fb8c28c1c223c61fa32b5"},{"fixed":"97a2d55ead76358245b446efd87818e919196d7a"},{"fixed":"b788ad3b2468512339c05f23692e36860264e674"},{"fixed":"3ff54d904fafabd0912796785e53cce4e69ca123"},{"fixed":"5b7d5c2dd664eb8b9a06ecbc06e28d39359c422e"},{"fixed":"af5818c35173e096085c6ae2e3aac605d3d15e41"},{"fixed":"2dcb368fe5a8eee498ca75c93a18ce2f3b0d6a8e"},{"fixed":"55c91fedd03d7b9cf0c5199b2eb12b9b8e95281a"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53515.json"}}],"schema_version":"1.7.5"}